Mike Just
Orcid: 0000-0002-9669-5067
According to our database1,
Mike Just
authored at least 64 papers
between 1994 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Individual Packet Features are a Risk to Model Generalisation in ML-Based Intrusion Detection.
CoRR, 2024
2023
Externally validating the IoTDevID device identification methodology using the CIC IoT 2022 Dataset.
CoRR, 2023
2022
IEEE Internet Things J., 2022
Digital security in families: the sources of information relate to the active mediation of internet safety and parental internet skills.
Behav. Inf. Technol., 2022
Proceedings of the 15th IEEE/ACM International Conference on Utility and Cloud Computing, 2022
Proceedings of the EICC 2022: European Interdisciplinary Cybersecurity Conference, Barcelona, Spain, June 15, 2022
2021
IoTDevID: A Behaviour-Based Fingerprinting Method for Device Identification in the IoT.
CoRR, 2021
A review of amplification-based distributed denial of service attacks and their mitigation.
Comput. Secur., 2021
Anomaly Detection for Insider Threats: An Objective Comparison of Machine Learning Models and Ensembles.
Proceedings of the ICT Systems Security and Privacy Protection, 2021
2020
Proceedings of the Secure IT Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, 2020
Are autistic children more vulnerable online? Relating autism to online safety, child wellbeing and parental risk management.
Proceedings of the NordiCHI '20: Shaping Experiences, 2020
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2020
2019
Probing the Mystery of Cryptocurrency Theft: An Investigation into Methods for Cryptocurrency Tainting Analysis.
CoRR, 2019
Proceedings of the Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
2018
Comput., 2018
Experimental large-scale review of attractors for detection of potentially unwanted applications.
Comput. Secur., 2018
2017
Stop annoying me!: an empirical investigation of the usability of app privacy notifications.
Proceedings of the 29th Australian Conference on Computer-Human Interaction, 2017
Keeping Children Safe Online: Understanding the Concerns of Carers of Children with Autism.
Proceedings of the Human-Computer Interaction - INTERACT 2017, 2017
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017
2016
J. Circuits Syst. Comput., 2016
Tag-Protector: An Effective and Dynamic Detection of Illegal Memory Accesses through Compile Time Code Instrumentation.
Adv. Softw. Eng., 2016
Proceedings of the Information Security Theory and Practice, 2016
Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, 2016
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016
2015
Inf. Comput. Secur., 2015
CoRR, 2015
Sensor use and usefulness: Trade-offs for data-driven authentication on mobile devices.
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communications, 2015
Why aren't Users Using Protection? Investigating the Usability of Smartphone Locking.
Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2015
2014
CoRR, 2014
Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors.
CoRR, 2014
Proceedings of the 7th International Conference on Security of Information and Networks, 2014
2013
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013
Stop questioning me!: towards optimizing user involvement during data collection on mobile devices.
Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2013
Proceedings of the Financial Cryptography and Data Security, 2013
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013
2012
On the security and usability of dual credential authentication in UK online banking.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012
Workshop on: Exploring the Challenges of Ethics, Privacy and Trust in Serious Gaming.
Proceedings of the Entertainment Computing - ICEC 2012 - 11th International Conference, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
Pictures or questions?: examining user responses to association-based authentication.
Proceedings of the 2010 British Computer Society Conference on Human-Computer Interaction, 2010
2009
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
2004
RFC, April, 2004
2003
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, Second International Conference, 2003
1999
Proceedings of the Network and Distributed System Security Symposium, 1999
1998
Proceedings of the Network and Distributed System Security Symposium, 1998
1996
Proceedings of the Advances in Cryptology, 1996
1994